SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal of Electrical and Computer Engineering (IJECE)
Vol.10, No.1, February2020, pp. 530~537
ISSN: 2088-8708, DOI: 10.11591/ijece.v10i1.pp530-537  530
Journal homepage: http://ijece.iaescore.com/index.php/IJECE
An efficient and secure data storage in cloud computing using
modified RSA public key cryptosystem
Y. Kiran Kumar1
, R. Mahammad Shafi2
1
Department of Computer Science, Bharathiar University, Coimbatore, India
2
Bharathiar University, Coimbatore, India
Article Info ABSTRACT
Article history:
Received Apr 16, 2019
Revised Aug 17, 2019
Accepted Aug 29, 2019
Cloud Computing is the ability to improve the utility or train new human
resources without investing in new infrastructure, or add capabilities to
existence without the latest software licensing. It expanded the capabilities of
Information Technology (IT). From the past few years, cloud computing has
developed from a good business concept in the best rising sectors of the IT
industry. But more information on individuals and companies was put in
the cloud, and concerns began to think about how secure the cloud
environment was. Despite cloud surrounding structures, enterprise users still
do not want to expand their business in the cloud. Security reduces
the growth of cloud computing and continues to spread the market with
complexity with data privacy and data protection. The security of cloud
computing has constantly been an significant aspect of improved quality of
service from cloud service providers. Data storage in the cloud has
a problem related to data security. However, cloud computing construct
many new security challenges which have not been well examine. In order to
ensure that the user's data in the cloud is secure, we have proposed an
effective mechanism with a distinctive feature of data integrity and privacy.
This paper focusing on problems relating to the cloud data storage techniques
and security in virtual environment. We recommend a method for providing
data storage and security in cloud using public key Cryptosystem, which uses
the concept of the modified RSA algorithm to provide better security for
the data stored in the cloud.
Keywords:
Cloud data storage
Cloud service models
Data security
Modified RSA
Public key cryptosystem
RSA
Copyright © 2020 Institute of Advanced Engineering and Science.
All rights reserved.
Corresponding Author:
R. Mahammad Shafi,
Research Spervisor, Bharathiar University,
Coimbatore, India,
Email: rmdshafi@gmail.com
1. INTRODUCTION
Cloud Computing has many unique features that make it very valuable. Different types of services
can be easily accessible from cloud computing. Cloud Computing services provide client-specific
applications and Data storage through dedicated cloud servers. That means there are no data and applications
on the computer used by the client. Only the operating system and the cloud computing service will be
the only application. The client will have to access the applications and data so that he can directly access
from cloud server. This whole process is called cloud computing. Using cloud computing does not have
the risk of software, crash, and data loss. Moreover, the client-utilized device also works faster.
With virtualization technologies, cloud computing uses more efficient resources [1]. Cloud Computing
services are growing and expected to expand in the future. The physical server runs many virtual machines
and operating systems. Cloud Computing has a facility to use computing resources directly through
the Internet. Computing source may be a combination of software or hardware, or both, and computing
resources will be released in the form of Internet services. A service allows the user to access the computing
Int J Elec & Comp Eng ISSN: 2088-8708 
An efficient and secure data storage in cloud computing using modified RSA public ... (Y. Kiran Kumar)
531
resource. Services operate on a remote server and users access the interface as a browser. Cloud computing
stores data stored on a user's remote cloud server [2]. Information technologies take new waves in order to
change civilizations. Computing significantly expanded, making the database more robust.
Cloud computing detects briefly that cloud computing services offer client-specific applications and
data storage through dedicated Web servers. In Cloud Computing all data is stored on a web server. There are
no data and applications on the client-utilized computer [3]. Only the operating system and the cloud
computing service will be the only application. Client Applications and data are accessible to get cloud
servers directly from cloud servers. There is no risk of software, crash and databases using cloud computing,
the client-utilized device also works faster.
2. CLOUD COMPUTING DEPLOYMENT MODELS
In Cloud Computing each model has a unique value proposition, which provides a line improvement
provider for the business and provides customer service option. The following is some of the major or
popular cloud operation models.
a. Private Cloud: Private Cloud infrastructure is controlled by a company or a third party and only maintains
the requirements of the company.
b. Public Cloud: Public Cloud infrastructure is available to a large organizations or general public and
owned by the vendor who provides cloud services.
c. Community Cloud: Community Cloud infrastructure is a shared community that has operated by one or
more organizations and supports the same services.
d. Hybrid Cloud: Hybrid Cloud infrastructure is a combination of two or more different cloud infrastructures
like private, public or community clouds, but portability of data and applications provided by standard
technology.
3. CLOUD COMPUTING SERVICES
The wide range of services offered by cloud computing organizations can be categorized into three
basictypes:
3.1. Software as a service (SaaS)
Many users allow access to the application when SaaS services provide better accessibility and
active functionality. SaaS services provide focused business operations. The cloud resource administrator
creates controls regarding users' access to applications.
3.2. Platform as a service (PaaS)
User configuration under PaaS does not use the applications and facilities provided by the cloud
provider. Cloud storage options are available to use cloud needs. The model pre-runner manages all cloud
computing designs. It provides support for applications and services and provides computational resources
through the host platform.
3.3. Infrastructure as a servive (IaaS)
This environment can include hardware, operating systems, network connectivity and other IT
resources. The IT resources provided by IaaS are generally not pre configured, placing the administrative
responsibility directly upon the cloud consumer. The user of the PaaS dedicated API makes it possible to
organize the activities of the server hosting engine to run and reproduce the environment based on user
requests. Each provider is based on its API related key capabilities, the app developed for each particular
group provider is not moved to another cloud host, but its API is excluded based on its related key
capabilities. There are attempts to extend simple programming designs with cloud capabilities. In Cloud
environment data is not stored on the user's computer but stored in the third parties cloud storage. The Cloud
Computing infrastructure allows its resources to be accessed between users, servers and can openly access
data/file stored in the cloud server. Due to this open access factor, one person's files or data is used by other
users of the cloud, resulting in more or less dangerous to treat data or files. Once intruders have access to
data, its abuse is a major threat. Intruder destroys the actual data or break off the communication. Cloud
service providers provide critical security over files and data that require much attention to security. One of
the most common problems in the cloud is that the person does not control the data storage space. Cloud
Service Provider provides a cloud user provided resource allocation and scheduling facility, when processed
when required to protect files/data. To defeat this problem, security in the cloud server should be effective.
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 530 - 537
532
4. DATA SECURITY USING ENCRYPTION
Security is a key element in wide range of areas like network security, data security and user access
mechanisms. In Cloud Computing one of the major area is data security, encryption mechanisms,
data resiliency and replication, data availability and integrity are some of the popular methods to provide data
security in cloud computing. In these methods we have used encryption method by using RSA and Modified
RSA algorithms. In cloud-based data transmissions most commonly used protocol is HTTPS, which uses
SSL/TLS underlying protocol. Most of the Transport Layer Security implementations used by RSA algorithm
because it is the chief asymmetrical encryption cipher.
Generally Cloud Services has more harm than the intra network services and also additional security
problems arise on virtualization and outsourced resources. The major Cloud Security problems are raised
based on the selection of Cloud Service Model and runtime of the applications. To identify the security
problems on the cloud environment we have to analyze the following steps:
1. Identify the resource: Identify which type of resource (Data/Applications or Services) to deploy on
the cloud environment.
2. Identify the access level of the resource: Identify the risks that that are associated on the resource related
to availability, privacy, unauthorized access and loss of data.
3. Identify the deployment model: Cloud deployment models are private, public, community and hybrid.
Identify which type of deployment model is appropriate for your resource.
4. Determine the delivery model: Different cloud delivery models are available such as IaaS, PaaS and SaaS.
Identify which type of delivery model is suitable for your IT resource.
5. Evaluation of Cloud Provider: Users need to assess the system to know where data is stored and how data
is transferred in and out of the cloud environment after identify resources offered by a cloud provider.
Infrastructure is provided by IaaS, Frameworks for application development, manage structures and
transactions provided by PaaS and an Operating Environment with applications, effective user interface and
management provided by SaaS. From the existing service models IaaS has the least integrated functionality
so it requires minimum security but SaaS has more integrated functionality so we require more security [4].
SaaS is delivery model for shared cloud services that can be located as commercialized products
hosted by clouds. In this model cloud consumer is given access the cloud service contact, but not any
underlying IT resources or implantation details. The PaaS cloud delivery model enables a cloud provider to
offer a preconfigured environment that cloud consumers can use to build and deploy cloud services and
solutions, even though with decreased administrative control. A Cloud Consumer is accessing a ready-made
PaaS environment. IaaS cloud delivery model offers cloud consumers a high level administrative control over
“raw” infrastructure-based IT resources. A cloud consumer is using a virtual server with in an IaaS
environment. Cloud consumers are provided with range of contractual guarantees by the cloud provider,
pertaining to characteristics such as capacity performance and availability.
5. RSA ALGORITHM
RSA authentication and the identity of service provider over insecure communication medium.
Cracking the RSA encryption is at most as difficult as factoring huge numbers [5, 6]. The RSA algorithm
involves three steps [7, 8]:
1. Generation of Key
2. Encryption by using Public Key and
3. Decryption by using Private Key.
Select two different prime numbers p and q.
The integer’s p and q should be generated at randomly because of security.
compute n = p*q;
compute f(n) = (p-1)(q-1)
choose e such that e is relatively prime to f(n) and less than f(n).
find out d such that de congruent modulo 1 (mod f(n)) and d<f(n).
Public key = {e, n}, Private key = {d, n}
Cipher text c = message e mod n
Plain text p = ciphertext d mod n
Int J Elec & Comp Eng ISSN: 2088-8708 
An efficient and secure data storage in cloud computing using modified RSA public ... (Y. Kiran Kumar)
533
6. MODIFIED RSA MODEL
Figure 1 show the encryption and decryption using MDRSA.
Figure 1. Encryption and decryption using MDRSA
We divide the program into 3 parts
1. plaintext + publickey1 --> ciphertext1
2. ciphertext1 + publickey2 --> ciphertext 2
3. ciphertext1 + private key --> plain text
In the majority cases the problem of RSA is breakable as of simply calculation of keys based on N,
because it is the only product of two prime numbers, N can be easily noticeable. Once the value of N is
recognized, an intruder can recover the keys and crack the system. The most important modifications which
build the system is capable and secure are considered in the modified RSA Model [9, 10].
Modified RSA algorithm is performed by following way:
1. n1 = p x q
2. n2 = r x s
3. N = n1*n2
4. ph = (p-1) (q-1) (r-1) (s-1)
5. e = e1*e2
6. Calculate e1 and e2 and multiply two values (e1*e2) or calculate e and divide e into e1 and e2 then we get
two encryption dan one decryption.
The modified RSA Model generates randomly four large prime numbers p, q, r and s. There are
three components consisting in public key generation e, f, N where e and f are at random generated and also
three components consisting in private key generation d, g, N where d and g are randomly generated [11, 12].
In customized RSA model more complexity number is N. In public and private key generation N is the same
value, an intruder with the information of N cannot find out the values of four prime numbers which are
essential for finding the value of N and consequently e and f [13, 14].
7. RESULTS AND DISCUSSIONS
Key Size: [1024]
Generated prime numbers p, q, r and s
p:
[DBB0B0485D335DF044F4EDD18415D5A43BAF2C9FB8A99BE5347E910138D19AF24788AF77801DE
68E47BBB85AA839DC374A539B3AE6F8449389BDC5FCEF3F6298C06C17264BA809FD7EC50FE0D9
A7753EF8F2C30216046------]
q:
[96D0AF060D3116D4686A5156CD44FF53B647376816B3F34D00BB7A0DAF048627A49494716E41DA
822D5734976DA6FB5EBA062CC913758E6208E93D6D7E4320331CE85C841E031095B0FDBA7730BD8
5F3CFD8FB9B1CAD15C------]
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 530 - 537
534
r:
[8DD21B80761BBF6C8C0DB42F70CBB9DE0962DC0C19DE32D77830B6856BE09E5158C302C94F982
12982086BB09DF8098064F848B8D4401D544E37C76D0B1C7033B431037FEAD1557296626188B20DF1
756E2B7A7191B2C72D4FB7A----]
s:
[9FEBECA150EB7E87E6F63C8E20E19F8112379CA8BF0FA7F474EB0BC6662BE29C2CD50B22330EB
0CA0D6BC9FE3288A275A706845CC518C989F2FBC1FD3001C18FBAE3BFA3505912B72D411A5DCD
CA18A941255699432494C1D2162-----]
Public Key pair n and E
Generated Value of N:
[2CCA47C6672AA889B2FBB67F1D71B6C4884A8CB7B0EBBD5FFEB52507C83DA918A509C858A389
37CDC68DDB55C20FE7F44C9195048F5E00447C66734D9094BDC164F067C68AD7470FF784282FBD3
2E123309C469E360EDF9-----]
Generated Value of E:
[D12E253C6B9A2D1C4DAF5890FB3D5ACBB8CBE7736E37AC70B3AEFEEC5AEF2B2AC2484C9E769
AF1D44831A9DDE0EF2E767269FFD07F99854B4A0583EAF4457B7907B2F50EBC55C4A34656E4AA6
2190477ECEF5BA8FF8CD0D01DB-----]
Private Key pair n and D
Generated Value of N:
[2CCA47C6672AA889B2FBB67F1D71B6C4884A8CB7B0EBBD5FFEB52507C83DA918A509C858A389
37CDC68DDB55C20FE7F44C9195048F5E00447DA64677C28F24FD8069389D8B6CFC66734D9094BDC
164F067C68AD7470FF784---------]
Generated Value of D:
[1A9A8F639F9776D55E9C0C79E00728BDE804E7A9C513613E1C5197FD519E78A030719A6705439235
97D602D5F1A9F8DA1192D491A73B68D94F47F27396FD95135BFD88EA9EB1A17A11D776A3D471D5
F6394632FA100BA7D4AFE883A3-----]
Please enter message (plaintext):
This is secret information
Generated Cipher text:
[532076F90468DA03C7696D357210A2DDB35444D25D764A1D705535B320F25029DB786E7DF8114C4
C4D877A271318D41823AA1B7647DACB1E2A9B9A866F951F740056732D758DF177FA41B280D3764B
F6D5B3202242210A9BF1E667-------]
Execution time for encryption in milliseconds: 3087.0078
Generated Cipher text1:
[1FAA52CC64E4A85AA9CD083C1116BC9BF07D90A8FD19A7C12C8C7FBEA0E976F788D5BA532F20
46D6D873E8031672A8A1A8B02772AB7F12679A647E1288417CF45B9E4AE6AE65D8DB49B6A6E3A3
C77E2B07B714E8BE2C56C7AF5-----]
Execution time for decryption in milliseconds: 3087.0078
Recovered plaintext: [This is secret information]
Figure 2 show time consumption for different key sizes by key generation using RSA and MDRSA
Algorithm.
Figure 2. Time consumption for different key sizes by key generation using RSA and MDRSA Algorithm
Int J Elec & Comp Eng ISSN: 2088-8708 
An efficient and secure data storage in cloud computing using modified RSA public ... (Y. Kiran Kumar)
535
The RSA and Modified RSA models represent the encryption and decryption time in milliseconds
based on key sizes from 128 bits to 2048 bits. We recommended that Modified RSA with key size 1024 bits
will be a optimize solution which make balance between speed and security from the reaming key size
values [15, 16].
8. PERFORMANCE EVALUATION
The proposed Modified RSA (MDSA) algorithm is examined on varying bit sizes of input.
Performance of original RSA algorithm by Rivest, Shamir, and Adleman [17, 18] are shown in Table 1.
Also the performance of Modified RSA (MDSA) scheme in terms of encryption time and decryption is
shown in Table 2. Comparing the above tables, it can be concluded that the time of key generation of
Modified RSA (MDSA) is higher than that of RSA. The higher key generation time of Modified RSA
(MDSA) can be seen as an advantage by the fact that the time to break the system is high because of the extra
complexity added. Figure 3 shown the encryption time comparison between RSA and proposed Modified
RSA (MDSA) scheme [19, 20]. It illustrates that, for the lower bit length of prime numbers, two algorithms
consume the almost identical amount of time. But with the increase of bit length, the difference between
curves rises rapidly [21, 22].
Table 1. Encryption time comparison using RSA
and MDRSA Algorithms
Table 2. Decryption time comparison using RSA
and MDRSA Algorithms
Key Size
(in bits)
Encryption time in
ms (RSA)
Encryption time
in ms (MDRSA)
128 0.19 0.68
256 0.36 1.48
512 0.57 3.2
1024 1.72 7.8
2048 3.33 21.92
4096 11.18 56.88
Key Size
(in bits)
Decryption time
in ms (RSA)
Decryption time in
ms (MDRSA)
128 0.29 2.9
256 0.98 14.28
512 5.3 87.96
1024 26.19 446.34
2048 130.84 2472.72
4096 1116.26 19983.38
Figure 3. Encryption and decryption time comparison using RSA and MDRSA Algorithms based on key size
Figure 3 illustrate the encryption and decryption time comparison between RSA and proposed
Modified RSA (MDSA) scheme. We recommended that Modified RSA with key size 1024 bits will be
a optimize solution which make balance between speed and security from the reaming key size
values [23, 24]. With the increase of bit length, the difference between curves elevates rapidly at key size
2048 and 4096, it can be easily seen that encryption and decryption times are higher than RSA. The increase
in time is adaptable because it increases the security to a great extent in the proposed Modified RSA (MRSA)
method [25].
9. CONCLUSION
This manuscript has proposed a structure to provide confidentiality protection to the data stored in
cloud environment. The modified RSA scheme used to protect the data in such a way that no reveal of data
on cloud. Thus, in our projected work, only the approved user can access the data using the private key can
be correctly decrypted. If some unauthorized users gets the data by chance or intentionally if he/she captures
 ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 530 - 537
536
the data also, he/she can’t decrypt it and get back the original data from it. With the help of this new security
model which is modified RSA Public Key Cryptosystem, we can improve the security flaw of existing data
security model in cloud environment and thereby guarantee the data security in cloud environment.
In this modified RSA algorithm verification is more secure than RSA algorithm.
REFERENCES
[1] Sosinsky, “Understanding Cloud Security,” Cloud Computing Bible Sosinsky/Cloud, 2011.
[2] B. A. Forouzan, “Cryptography and Network Security,” Tata McGraw Hill Education Private Limited, New York,
2010.
[3] M. B. Mollah, et al., “Next generation of computing through cloud computing technology,”2012 25th IEEE
Canadian Conference on Electrical and Computer Engineering (CCECE), 2012.
[4] Thomas E., “Cloud Computing, Concepts, Technology & Architecture,” Pearson Publication,2014.
[5] M. A. Islam, et al., “A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime
Numbers,”Journal of Computer and Communications, 2018.
[6] I. G. Amalarethinam and H. M. Leena, “Enhanced RSA Algorithm with Varying Key Sizes for Data Security in
Cloud,”2017 World Congress on Computing and Communication Technologies (WCCCT), Tiruchirappalli,
pp. 172-175, 2017.
[7] Y. Pachipala, et al., “Data Security in Cloud using RSA,” 2013 Fourth International Conference on Computing
Communications and Networking Technologies (ICCCNT), 2013.
[8] P. Garg and V. Sharma. “An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash
function,”International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014.
[9] A.V.N. Krishna, “Chapter 16 A Randamized Cloud Library Security Environment,” IGI Global,2014.
[10] R. Biswas, et al., “A fast implementation of the RSA algorithm using the GNU MP library,” IIIT – Calcutta.
[11] S. Sharma, “RSA algorithm using modified subset sum cryptosystem,”Computer and Communication Technology
(ICCCT), pp. 457-461, 2011.
[12] A. Mousa, “Sensitivity of Changing the RSA Parameters on the Complexity and Performance of
the Algorithm,”Journal of Applied Science,Asian Network for Scientific Information,vol. 5, pp. 60-63,2005.
[13] M. A. Islam, et al., “A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime
Numbers,”Journal of Computer and Communications, vol. 6, pp. 78-90, 2018.
[14] M. Thangavel, et al., “An Enhanced and Secured RSA Key Generation Scheme (ESRKGS),”Journal of
Information Security and Applications, 2015.
[15] R. S. Dhakar, et al.,“Modified RSA Encryption Algorithm (MREA),”2012 Second International Conference on
Advanced Computing Communication Technologies, Rohtak, pp. 426-429, 2012.
[16] H. M. Sun, et al.,“Dual RSA and Its Security Analysis,”IEEE Transactions on Information Theory, vol. 53,
pp. 2922-2933, 2007.
[17] T. C. Segar and R. Vijayaragavan, “Pell’s RSA Key Generation and Its Security Analysis,”2013 Fourth
International Conference on Computing, Communications and Networking Technologies (ICCCNT),
Tiruchengode,pp. 1-5, 2013.
[18] M. J. Wiener, “Cryptanalysis of Short RSA Secret Exponents,”IEEE Transactions on Information Theory, vol. 36,
pp. 553-558, 1990.
[19] A. H. Al-Hamami and I. A. Aldariseh, “Enhanced Method for RSA Cryptosystem Algorithm,”2012 International
Conference on Advanced Computer Science Applications and Technologies (ACSAT),pp. 402-408, 2012.
[20] Y. Li, et al.,“Design and Implementation of an Improved RSA Algorithm,”2010 International Conference on E -
Health Networking Digital Ecosy stems and Technologies ( EDT ), Shenzhen, vol. 1, pp. 390-393, 2010.
[21] A. Chhabra and S. Mathur, “Modified RSA Algorithm: A Secure Approach,”2011 International Conference on
Computational Intelligence and Communication Networks, Gwalior, pp. 545-548, 2011.
[22] B. Swami, et al.,“Dual Modulus RSA Based on Jordan-totient Function, Procedia Technology,vol. 24, pp. 1581-
1586, 2016.
[23] R. Patidar and R. Bhartiya, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number,”2013
IEEE International Conference on Computational Intelligence and Computing Research, Enathi, pp.1-6, 2013.
[24] R. L. Rivest, et al., “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,”Communications
of the ACM , vol. 21, pp. 120-126, 1978.
[25] K. Govinda, et al.,“Data Security in Cloud using Blowfish Algorithm,”International Journal for Scientific
Research & Development,vol. 2, 2014.
Int J Elec & Comp Eng ISSN: 2088-8708 
An efficient and secure data storage in cloud computing using modified RSA public ... (Y. Kiran Kumar)
537
BIOGRAPHIES OF AUTHORS
Mr. Y.Kiran Kumar, M.C.A, (Ph.D), he received his Master of Computer Applications from
Sri Venkatesra University,Tirupati. He is Pursuing Ph.D from Bharathiar University,
Coimbatore. He is having more than 10 years of teaching experience, Currently he is working
as a Assistant Professor in the department of M.C.A in Sree Vidyanikethan Engineering
College, Affiliated by JNTUA, Ananthapuramu, India. His areas of research interests include
Web Technologies, Service Oriented Architecture and Cloud Computing.
Dr. R. Mahammad Shafi, M.C.A, M.Tech, Ph.D He received his Ph.D from University of
Allahabad, Allahabad. He is having more than 20 years of teaching experience. His areas of
research interests include Software Engineering, Software Testing and Quality Assurance.
He has published papers in refereed journals and conference proceedings in these areas.
He has been involved in conferences and workshops as a Committee member, organizer and
Session Chair.

More Related Content

What's hot

Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
Editor IJARCET
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
ijcsit
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
Editor IJCATR
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
IJERA Editor
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
eSAT Publishing House
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
Alexander Decker
 

What's hot (18)

Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409Ijarcet vol-2-issue-4-1405-1409
Ijarcet vol-2-issue-4-1405-1409
 
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud StorehouseIRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
IRJET- An Effective Protection on Content based Retrieval in Cloud Storehouse
 
Cloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher modelCloud computing security through symmetric cipher model
Cloud computing security through symmetric cipher model
 
Security for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi CloudsSecurity for Effective Data Storage in Multi Clouds
Security for Effective Data Storage in Multi Clouds
 
Trust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto ModelTrust Your Cloud Service Provider: User Based Crypto Model
Trust Your Cloud Service Provider: User Based Crypto Model
 
Cloud Security Mechanisms
Cloud Security MechanismsCloud Security Mechanisms
Cloud Security Mechanisms
 
G033030035
G033030035G033030035
G033030035
 
Cloud Computing Security Issues
Cloud Computing Security IssuesCloud Computing Security Issues
Cloud Computing Security Issues
 
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
Public Key Encryption algorithms Enabling Efficiency Using SaaS in Cloud Comp...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
IRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based EncryptionIRJET- Secure Cloud Data Using Attribute Based Encryption
IRJET- Secure Cloud Data Using Attribute Based Encryption
 
Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...Fog computing a new concept to minimize the attacks and to provide security i...
Fog computing a new concept to minimize the attacks and to provide security i...
 
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generationImprove HLA based Encryption Process using fixed Size Aggregate Key generation
Improve HLA based Encryption Process using fixed Size Aggregate Key generation
 
A survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniquesA survey on data security in cloud computing issues and mitigation techniques
A survey on data security in cloud computing issues and mitigation techniques
 
5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing5.[40 44]enhancing security in cloud computing
5.[40 44]enhancing security in cloud computing
 
Paper id 27201433
Paper id 27201433Paper id 27201433
Paper id 27201433
 
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service ProvidersA Secure Framework for Cloud Computing With Multi-cloud Service Providers
A Secure Framework for Cloud Computing With Multi-cloud Service Providers
 
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud StorageA Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
A Trusted TPA Model, to Improve Security & Reliability for Cloud Storage
 

Similar to An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem

fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
priyanka reddy
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
Iaetsd Iaetsd
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
IJERA Editor
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
IJTET Journal
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
Editor IJCATR
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
Iaetsd Iaetsd
 

Similar to An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem (20)

Cloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion DetectionCloud Computing Using Encryption and Intrusion Detection
Cloud Computing Using Encryption and Intrusion Detection
 
fog computing provide security to the data in cloud
fog computing provide security to the data in cloudfog computing provide security to the data in cloud
fog computing provide security to the data in cloud
 
Fog computing document
Fog computing documentFog computing document
Fog computing document
 
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
Methodologies for Enhancing Data Integrity and Security in Distributed Cloud ...
 
improve cloud security
improve cloud securityimprove cloud security
improve cloud security
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through SteganographyEnhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
 
Iaetsd cloud computing and security challenges
Iaetsd cloud computing and security challengesIaetsd cloud computing and security challenges
Iaetsd cloud computing and security challenges
 
Aes based secured framework for cloud databases
Aes based secured framework for cloud databasesAes based secured framework for cloud databases
Aes based secured framework for cloud databases
 
Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions. Security Issues’ in Cloud Computing and its Solutions.
Security Issues’ in Cloud Computing and its Solutions.
 
Secure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted CloudSecure Data Sharing In an Untrusted Cloud
Secure Data Sharing In an Untrusted Cloud
 
Security and privacy approach of cloud computing
Security and privacy approach of cloud computingSecurity and privacy approach of cloud computing
Security and privacy approach of cloud computing
 
Enhanced security framework to ensure data security
Enhanced security framework to ensure data securityEnhanced security framework to ensure data security
Enhanced security framework to ensure data security
 
Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...Enhanced security framework to ensure data security in cloud using security b...
Enhanced security framework to ensure data security in cloud using security b...
 
An Overview To Cloud Computing
An Overview To Cloud ComputingAn Overview To Cloud Computing
An Overview To Cloud Computing
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
A Secure Cloud Storage System with Data Forwarding using Proxy Re-encryption ...
 
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
A Secure, Scalable, Flexible and Fine-Grained Access Control Using Hierarchic...
 
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTINGA STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
A STUDY OF THE ISSUES AND SECURITY OF CLOUD COMPUTING
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
G0314043
G0314043G0314043
G0314043
 

More from IJECEIAES

Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
IJECEIAES
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
IJECEIAES
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
IJECEIAES
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
IJECEIAES
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
IJECEIAES
 
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
IJECEIAES
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
IJECEIAES
 
A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...
IJECEIAES
 
Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
IJECEIAES
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
IJECEIAES
 

More from IJECEIAES (20)

Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...Remote field-programmable gate array laboratory for signal acquisition and de...
Remote field-programmable gate array laboratory for signal acquisition and de...
 
Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...Detecting and resolving feature envy through automated machine learning and m...
Detecting and resolving feature envy through automated machine learning and m...
 
Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...Smart monitoring technique for solar cell systems using internet of things ba...
Smart monitoring technique for solar cell systems using internet of things ba...
 
An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...An efficient security framework for intrusion detection and prevention in int...
An efficient security framework for intrusion detection and prevention in int...
 
Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...Developing a smart system for infant incubators using the internet of things ...
Developing a smart system for infant incubators using the internet of things ...
 
A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...A review on internet of things-based stingless bee's honey production with im...
A review on internet of things-based stingless bee's honey production with im...
 
A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...A trust based secure access control using authentication mechanism for intero...
A trust based secure access control using authentication mechanism for intero...
 
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbersFuzzy linear programming with the intuitionistic polygonal fuzzy numbers
Fuzzy linear programming with the intuitionistic polygonal fuzzy numbers
 
The performance of artificial intelligence in prostate magnetic resonance im...
The performance of artificial intelligence in prostate  magnetic resonance im...The performance of artificial intelligence in prostate  magnetic resonance im...
The performance of artificial intelligence in prostate magnetic resonance im...
 
Seizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networksSeizure stage detection of epileptic seizure using convolutional neural networks
Seizure stage detection of epileptic seizure using convolutional neural networks
 
Analysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behaviorAnalysis of driving style using self-organizing maps to analyze driver behavior
Analysis of driving style using self-organizing maps to analyze driver behavior
 
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...Hyperspectral object classification using hybrid spectral-spatial fusion and ...
Hyperspectral object classification using hybrid spectral-spatial fusion and ...
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
SADCNN-ORBM: a hybrid deep learning model based citrus disease detection and ...
 
Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...Performance enhancement of machine learning algorithm for breast cancer diagn...
Performance enhancement of machine learning algorithm for breast cancer diagn...
 
A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...A deep learning framework for accurate diagnosis of colorectal cancer using h...
A deep learning framework for accurate diagnosis of colorectal cancer using h...
 
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
Swarm flip-crossover algorithm: a new swarm-based metaheuristic enriched with...
 
Predicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learningPredicting churn with filter-based techniques and deep learning
Predicting churn with filter-based techniques and deep learning
 
Taxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca AirportTaxi-out time prediction at Mohammed V Casablanca Airport
Taxi-out time prediction at Mohammed V Casablanca Airport
 
Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...Automatic customer review summarization using deep learningbased hybrid senti...
Automatic customer review summarization using deep learningbased hybrid senti...
 

Recently uploaded

Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
hublikarsn
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
jaanualu31
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
meharikiros2
 

Recently uploaded (20)

HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
fitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .pptfitting shop and tools used in fitting shop .ppt
fitting shop and tools used in fitting shop .ppt
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Introduction to Geographic Information Systems
Introduction to Geographic Information SystemsIntroduction to Geographic Information Systems
Introduction to Geographic Information Systems
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor8086 Microprocessor Architecture: 16-bit microprocessor
8086 Microprocessor Architecture: 16-bit microprocessor
 
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
👉 Yavatmal Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top Class Call Girl S...
 
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...8th International Conference on Soft Computing, Mathematics and Control (SMC ...
8th International Conference on Soft Computing, Mathematics and Control (SMC ...
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Query optimization and processing for advanced database systems
Query optimization and processing for advanced database systemsQuery optimization and processing for advanced database systems
Query optimization and processing for advanced database systems
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech studentsAIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 

An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem

  • 1. International Journal of Electrical and Computer Engineering (IJECE) Vol.10, No.1, February2020, pp. 530~537 ISSN: 2088-8708, DOI: 10.11591/ijece.v10i1.pp530-537  530 Journal homepage: http://ijece.iaescore.com/index.php/IJECE An efficient and secure data storage in cloud computing using modified RSA public key cryptosystem Y. Kiran Kumar1 , R. Mahammad Shafi2 1 Department of Computer Science, Bharathiar University, Coimbatore, India 2 Bharathiar University, Coimbatore, India Article Info ABSTRACT Article history: Received Apr 16, 2019 Revised Aug 17, 2019 Accepted Aug 29, 2019 Cloud Computing is the ability to improve the utility or train new human resources without investing in new infrastructure, or add capabilities to existence without the latest software licensing. It expanded the capabilities of Information Technology (IT). From the past few years, cloud computing has developed from a good business concept in the best rising sectors of the IT industry. But more information on individuals and companies was put in the cloud, and concerns began to think about how secure the cloud environment was. Despite cloud surrounding structures, enterprise users still do not want to expand their business in the cloud. Security reduces the growth of cloud computing and continues to spread the market with complexity with data privacy and data protection. The security of cloud computing has constantly been an significant aspect of improved quality of service from cloud service providers. Data storage in the cloud has a problem related to data security. However, cloud computing construct many new security challenges which have not been well examine. In order to ensure that the user's data in the cloud is secure, we have proposed an effective mechanism with a distinctive feature of data integrity and privacy. This paper focusing on problems relating to the cloud data storage techniques and security in virtual environment. We recommend a method for providing data storage and security in cloud using public key Cryptosystem, which uses the concept of the modified RSA algorithm to provide better security for the data stored in the cloud. Keywords: Cloud data storage Cloud service models Data security Modified RSA Public key cryptosystem RSA Copyright © 2020 Institute of Advanced Engineering and Science. All rights reserved. Corresponding Author: R. Mahammad Shafi, Research Spervisor, Bharathiar University, Coimbatore, India, Email: rmdshafi@gmail.com 1. INTRODUCTION Cloud Computing has many unique features that make it very valuable. Different types of services can be easily accessible from cloud computing. Cloud Computing services provide client-specific applications and Data storage through dedicated cloud servers. That means there are no data and applications on the computer used by the client. Only the operating system and the cloud computing service will be the only application. The client will have to access the applications and data so that he can directly access from cloud server. This whole process is called cloud computing. Using cloud computing does not have the risk of software, crash, and data loss. Moreover, the client-utilized device also works faster. With virtualization technologies, cloud computing uses more efficient resources [1]. Cloud Computing services are growing and expected to expand in the future. The physical server runs many virtual machines and operating systems. Cloud Computing has a facility to use computing resources directly through the Internet. Computing source may be a combination of software or hardware, or both, and computing resources will be released in the form of Internet services. A service allows the user to access the computing
  • 2. Int J Elec & Comp Eng ISSN: 2088-8708  An efficient and secure data storage in cloud computing using modified RSA public ... (Y. Kiran Kumar) 531 resource. Services operate on a remote server and users access the interface as a browser. Cloud computing stores data stored on a user's remote cloud server [2]. Information technologies take new waves in order to change civilizations. Computing significantly expanded, making the database more robust. Cloud computing detects briefly that cloud computing services offer client-specific applications and data storage through dedicated Web servers. In Cloud Computing all data is stored on a web server. There are no data and applications on the client-utilized computer [3]. Only the operating system and the cloud computing service will be the only application. Client Applications and data are accessible to get cloud servers directly from cloud servers. There is no risk of software, crash and databases using cloud computing, the client-utilized device also works faster. 2. CLOUD COMPUTING DEPLOYMENT MODELS In Cloud Computing each model has a unique value proposition, which provides a line improvement provider for the business and provides customer service option. The following is some of the major or popular cloud operation models. a. Private Cloud: Private Cloud infrastructure is controlled by a company or a third party and only maintains the requirements of the company. b. Public Cloud: Public Cloud infrastructure is available to a large organizations or general public and owned by the vendor who provides cloud services. c. Community Cloud: Community Cloud infrastructure is a shared community that has operated by one or more organizations and supports the same services. d. Hybrid Cloud: Hybrid Cloud infrastructure is a combination of two or more different cloud infrastructures like private, public or community clouds, but portability of data and applications provided by standard technology. 3. CLOUD COMPUTING SERVICES The wide range of services offered by cloud computing organizations can be categorized into three basictypes: 3.1. Software as a service (SaaS) Many users allow access to the application when SaaS services provide better accessibility and active functionality. SaaS services provide focused business operations. The cloud resource administrator creates controls regarding users' access to applications. 3.2. Platform as a service (PaaS) User configuration under PaaS does not use the applications and facilities provided by the cloud provider. Cloud storage options are available to use cloud needs. The model pre-runner manages all cloud computing designs. It provides support for applications and services and provides computational resources through the host platform. 3.3. Infrastructure as a servive (IaaS) This environment can include hardware, operating systems, network connectivity and other IT resources. The IT resources provided by IaaS are generally not pre configured, placing the administrative responsibility directly upon the cloud consumer. The user of the PaaS dedicated API makes it possible to organize the activities of the server hosting engine to run and reproduce the environment based on user requests. Each provider is based on its API related key capabilities, the app developed for each particular group provider is not moved to another cloud host, but its API is excluded based on its related key capabilities. There are attempts to extend simple programming designs with cloud capabilities. In Cloud environment data is not stored on the user's computer but stored in the third parties cloud storage. The Cloud Computing infrastructure allows its resources to be accessed between users, servers and can openly access data/file stored in the cloud server. Due to this open access factor, one person's files or data is used by other users of the cloud, resulting in more or less dangerous to treat data or files. Once intruders have access to data, its abuse is a major threat. Intruder destroys the actual data or break off the communication. Cloud service providers provide critical security over files and data that require much attention to security. One of the most common problems in the cloud is that the person does not control the data storage space. Cloud Service Provider provides a cloud user provided resource allocation and scheduling facility, when processed when required to protect files/data. To defeat this problem, security in the cloud server should be effective.
  • 3.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 530 - 537 532 4. DATA SECURITY USING ENCRYPTION Security is a key element in wide range of areas like network security, data security and user access mechanisms. In Cloud Computing one of the major area is data security, encryption mechanisms, data resiliency and replication, data availability and integrity are some of the popular methods to provide data security in cloud computing. In these methods we have used encryption method by using RSA and Modified RSA algorithms. In cloud-based data transmissions most commonly used protocol is HTTPS, which uses SSL/TLS underlying protocol. Most of the Transport Layer Security implementations used by RSA algorithm because it is the chief asymmetrical encryption cipher. Generally Cloud Services has more harm than the intra network services and also additional security problems arise on virtualization and outsourced resources. The major Cloud Security problems are raised based on the selection of Cloud Service Model and runtime of the applications. To identify the security problems on the cloud environment we have to analyze the following steps: 1. Identify the resource: Identify which type of resource (Data/Applications or Services) to deploy on the cloud environment. 2. Identify the access level of the resource: Identify the risks that that are associated on the resource related to availability, privacy, unauthorized access and loss of data. 3. Identify the deployment model: Cloud deployment models are private, public, community and hybrid. Identify which type of deployment model is appropriate for your resource. 4. Determine the delivery model: Different cloud delivery models are available such as IaaS, PaaS and SaaS. Identify which type of delivery model is suitable for your IT resource. 5. Evaluation of Cloud Provider: Users need to assess the system to know where data is stored and how data is transferred in and out of the cloud environment after identify resources offered by a cloud provider. Infrastructure is provided by IaaS, Frameworks for application development, manage structures and transactions provided by PaaS and an Operating Environment with applications, effective user interface and management provided by SaaS. From the existing service models IaaS has the least integrated functionality so it requires minimum security but SaaS has more integrated functionality so we require more security [4]. SaaS is delivery model for shared cloud services that can be located as commercialized products hosted by clouds. In this model cloud consumer is given access the cloud service contact, but not any underlying IT resources or implantation details. The PaaS cloud delivery model enables a cloud provider to offer a preconfigured environment that cloud consumers can use to build and deploy cloud services and solutions, even though with decreased administrative control. A Cloud Consumer is accessing a ready-made PaaS environment. IaaS cloud delivery model offers cloud consumers a high level administrative control over “raw” infrastructure-based IT resources. A cloud consumer is using a virtual server with in an IaaS environment. Cloud consumers are provided with range of contractual guarantees by the cloud provider, pertaining to characteristics such as capacity performance and availability. 5. RSA ALGORITHM RSA authentication and the identity of service provider over insecure communication medium. Cracking the RSA encryption is at most as difficult as factoring huge numbers [5, 6]. The RSA algorithm involves three steps [7, 8]: 1. Generation of Key 2. Encryption by using Public Key and 3. Decryption by using Private Key. Select two different prime numbers p and q. The integer’s p and q should be generated at randomly because of security. compute n = p*q; compute f(n) = (p-1)(q-1) choose e such that e is relatively prime to f(n) and less than f(n). find out d such that de congruent modulo 1 (mod f(n)) and d<f(n). Public key = {e, n}, Private key = {d, n} Cipher text c = message e mod n Plain text p = ciphertext d mod n
  • 4. Int J Elec & Comp Eng ISSN: 2088-8708  An efficient and secure data storage in cloud computing using modified RSA public ... (Y. Kiran Kumar) 533 6. MODIFIED RSA MODEL Figure 1 show the encryption and decryption using MDRSA. Figure 1. Encryption and decryption using MDRSA We divide the program into 3 parts 1. plaintext + publickey1 --> ciphertext1 2. ciphertext1 + publickey2 --> ciphertext 2 3. ciphertext1 + private key --> plain text In the majority cases the problem of RSA is breakable as of simply calculation of keys based on N, because it is the only product of two prime numbers, N can be easily noticeable. Once the value of N is recognized, an intruder can recover the keys and crack the system. The most important modifications which build the system is capable and secure are considered in the modified RSA Model [9, 10]. Modified RSA algorithm is performed by following way: 1. n1 = p x q 2. n2 = r x s 3. N = n1*n2 4. ph = (p-1) (q-1) (r-1) (s-1) 5. e = e1*e2 6. Calculate e1 and e2 and multiply two values (e1*e2) or calculate e and divide e into e1 and e2 then we get two encryption dan one decryption. The modified RSA Model generates randomly four large prime numbers p, q, r and s. There are three components consisting in public key generation e, f, N where e and f are at random generated and also three components consisting in private key generation d, g, N where d and g are randomly generated [11, 12]. In customized RSA model more complexity number is N. In public and private key generation N is the same value, an intruder with the information of N cannot find out the values of four prime numbers which are essential for finding the value of N and consequently e and f [13, 14]. 7. RESULTS AND DISCUSSIONS Key Size: [1024] Generated prime numbers p, q, r and s p: [DBB0B0485D335DF044F4EDD18415D5A43BAF2C9FB8A99BE5347E910138D19AF24788AF77801DE 68E47BBB85AA839DC374A539B3AE6F8449389BDC5FCEF3F6298C06C17264BA809FD7EC50FE0D9 A7753EF8F2C30216046------] q: [96D0AF060D3116D4686A5156CD44FF53B647376816B3F34D00BB7A0DAF048627A49494716E41DA 822D5734976DA6FB5EBA062CC913758E6208E93D6D7E4320331CE85C841E031095B0FDBA7730BD8 5F3CFD8FB9B1CAD15C------]
  • 5.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 530 - 537 534 r: [8DD21B80761BBF6C8C0DB42F70CBB9DE0962DC0C19DE32D77830B6856BE09E5158C302C94F982 12982086BB09DF8098064F848B8D4401D544E37C76D0B1C7033B431037FEAD1557296626188B20DF1 756E2B7A7191B2C72D4FB7A----] s: [9FEBECA150EB7E87E6F63C8E20E19F8112379CA8BF0FA7F474EB0BC6662BE29C2CD50B22330EB 0CA0D6BC9FE3288A275A706845CC518C989F2FBC1FD3001C18FBAE3BFA3505912B72D411A5DCD CA18A941255699432494C1D2162-----] Public Key pair n and E Generated Value of N: [2CCA47C6672AA889B2FBB67F1D71B6C4884A8CB7B0EBBD5FFEB52507C83DA918A509C858A389 37CDC68DDB55C20FE7F44C9195048F5E00447C66734D9094BDC164F067C68AD7470FF784282FBD3 2E123309C469E360EDF9-----] Generated Value of E: [D12E253C6B9A2D1C4DAF5890FB3D5ACBB8CBE7736E37AC70B3AEFEEC5AEF2B2AC2484C9E769 AF1D44831A9DDE0EF2E767269FFD07F99854B4A0583EAF4457B7907B2F50EBC55C4A34656E4AA6 2190477ECEF5BA8FF8CD0D01DB-----] Private Key pair n and D Generated Value of N: [2CCA47C6672AA889B2FBB67F1D71B6C4884A8CB7B0EBBD5FFEB52507C83DA918A509C858A389 37CDC68DDB55C20FE7F44C9195048F5E00447DA64677C28F24FD8069389D8B6CFC66734D9094BDC 164F067C68AD7470FF784---------] Generated Value of D: [1A9A8F639F9776D55E9C0C79E00728BDE804E7A9C513613E1C5197FD519E78A030719A6705439235 97D602D5F1A9F8DA1192D491A73B68D94F47F27396FD95135BFD88EA9EB1A17A11D776A3D471D5 F6394632FA100BA7D4AFE883A3-----] Please enter message (plaintext): This is secret information Generated Cipher text: [532076F90468DA03C7696D357210A2DDB35444D25D764A1D705535B320F25029DB786E7DF8114C4 C4D877A271318D41823AA1B7647DACB1E2A9B9A866F951F740056732D758DF177FA41B280D3764B F6D5B3202242210A9BF1E667-------] Execution time for encryption in milliseconds: 3087.0078 Generated Cipher text1: [1FAA52CC64E4A85AA9CD083C1116BC9BF07D90A8FD19A7C12C8C7FBEA0E976F788D5BA532F20 46D6D873E8031672A8A1A8B02772AB7F12679A647E1288417CF45B9E4AE6AE65D8DB49B6A6E3A3 C77E2B07B714E8BE2C56C7AF5-----] Execution time for decryption in milliseconds: 3087.0078 Recovered plaintext: [This is secret information] Figure 2 show time consumption for different key sizes by key generation using RSA and MDRSA Algorithm. Figure 2. Time consumption for different key sizes by key generation using RSA and MDRSA Algorithm
  • 6. Int J Elec & Comp Eng ISSN: 2088-8708  An efficient and secure data storage in cloud computing using modified RSA public ... (Y. Kiran Kumar) 535 The RSA and Modified RSA models represent the encryption and decryption time in milliseconds based on key sizes from 128 bits to 2048 bits. We recommended that Modified RSA with key size 1024 bits will be a optimize solution which make balance between speed and security from the reaming key size values [15, 16]. 8. PERFORMANCE EVALUATION The proposed Modified RSA (MDSA) algorithm is examined on varying bit sizes of input. Performance of original RSA algorithm by Rivest, Shamir, and Adleman [17, 18] are shown in Table 1. Also the performance of Modified RSA (MDSA) scheme in terms of encryption time and decryption is shown in Table 2. Comparing the above tables, it can be concluded that the time of key generation of Modified RSA (MDSA) is higher than that of RSA. The higher key generation time of Modified RSA (MDSA) can be seen as an advantage by the fact that the time to break the system is high because of the extra complexity added. Figure 3 shown the encryption time comparison between RSA and proposed Modified RSA (MDSA) scheme [19, 20]. It illustrates that, for the lower bit length of prime numbers, two algorithms consume the almost identical amount of time. But with the increase of bit length, the difference between curves rises rapidly [21, 22]. Table 1. Encryption time comparison using RSA and MDRSA Algorithms Table 2. Decryption time comparison using RSA and MDRSA Algorithms Key Size (in bits) Encryption time in ms (RSA) Encryption time in ms (MDRSA) 128 0.19 0.68 256 0.36 1.48 512 0.57 3.2 1024 1.72 7.8 2048 3.33 21.92 4096 11.18 56.88 Key Size (in bits) Decryption time in ms (RSA) Decryption time in ms (MDRSA) 128 0.29 2.9 256 0.98 14.28 512 5.3 87.96 1024 26.19 446.34 2048 130.84 2472.72 4096 1116.26 19983.38 Figure 3. Encryption and decryption time comparison using RSA and MDRSA Algorithms based on key size Figure 3 illustrate the encryption and decryption time comparison between RSA and proposed Modified RSA (MDSA) scheme. We recommended that Modified RSA with key size 1024 bits will be a optimize solution which make balance between speed and security from the reaming key size values [23, 24]. With the increase of bit length, the difference between curves elevates rapidly at key size 2048 and 4096, it can be easily seen that encryption and decryption times are higher than RSA. The increase in time is adaptable because it increases the security to a great extent in the proposed Modified RSA (MRSA) method [25]. 9. CONCLUSION This manuscript has proposed a structure to provide confidentiality protection to the data stored in cloud environment. The modified RSA scheme used to protect the data in such a way that no reveal of data on cloud. Thus, in our projected work, only the approved user can access the data using the private key can be correctly decrypted. If some unauthorized users gets the data by chance or intentionally if he/she captures
  • 7.  ISSN: 2088-8708 Int J Elec & Comp Eng, Vol. 10, No. 1, February 2020 : 530 - 537 536 the data also, he/she can’t decrypt it and get back the original data from it. With the help of this new security model which is modified RSA Public Key Cryptosystem, we can improve the security flaw of existing data security model in cloud environment and thereby guarantee the data security in cloud environment. In this modified RSA algorithm verification is more secure than RSA algorithm. REFERENCES [1] Sosinsky, “Understanding Cloud Security,” Cloud Computing Bible Sosinsky/Cloud, 2011. [2] B. A. Forouzan, “Cryptography and Network Security,” Tata McGraw Hill Education Private Limited, New York, 2010. [3] M. B. Mollah, et al., “Next generation of computing through cloud computing technology,”2012 25th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE), 2012. [4] Thomas E., “Cloud Computing, Concepts, Technology & Architecture,” Pearson Publication,2014. [5] M. A. Islam, et al., “A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers,”Journal of Computer and Communications, 2018. [6] I. G. Amalarethinam and H. M. Leena, “Enhanced RSA Algorithm with Varying Key Sizes for Data Security in Cloud,”2017 World Congress on Computing and Communication Technologies (WCCCT), Tiruchirappalli, pp. 172-175, 2017. [7] Y. Pachipala, et al., “Data Security in Cloud using RSA,” 2013 Fourth International Conference on Computing Communications and Networking Technologies (ICCCNT), 2013. [8] P. Garg and V. Sharma. “An efficient and secure data storage in Mobile Cloud Computing through RSA and Hash function,”International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014. [9] A.V.N. Krishna, “Chapter 16 A Randamized Cloud Library Security Environment,” IGI Global,2014. [10] R. Biswas, et al., “A fast implementation of the RSA algorithm using the GNU MP library,” IIIT – Calcutta. [11] S. Sharma, “RSA algorithm using modified subset sum cryptosystem,”Computer and Communication Technology (ICCCT), pp. 457-461, 2011. [12] A. Mousa, “Sensitivity of Changing the RSA Parameters on the Complexity and Performance of the Algorithm,”Journal of Applied Science,Asian Network for Scientific Information,vol. 5, pp. 60-63,2005. [13] M. A. Islam, et al., “A Modified and Secured RSA Public Key Cryptosystem Based on “n” Prime Numbers,”Journal of Computer and Communications, vol. 6, pp. 78-90, 2018. [14] M. Thangavel, et al., “An Enhanced and Secured RSA Key Generation Scheme (ESRKGS),”Journal of Information Security and Applications, 2015. [15] R. S. Dhakar, et al.,“Modified RSA Encryption Algorithm (MREA),”2012 Second International Conference on Advanced Computing Communication Technologies, Rohtak, pp. 426-429, 2012. [16] H. M. Sun, et al.,“Dual RSA and Its Security Analysis,”IEEE Transactions on Information Theory, vol. 53, pp. 2922-2933, 2007. [17] T. C. Segar and R. Vijayaragavan, “Pell’s RSA Key Generation and Its Security Analysis,”2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT), Tiruchengode,pp. 1-5, 2013. [18] M. J. Wiener, “Cryptanalysis of Short RSA Secret Exponents,”IEEE Transactions on Information Theory, vol. 36, pp. 553-558, 1990. [19] A. H. Al-Hamami and I. A. Aldariseh, “Enhanced Method for RSA Cryptosystem Algorithm,”2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT),pp. 402-408, 2012. [20] Y. Li, et al.,“Design and Implementation of an Improved RSA Algorithm,”2010 International Conference on E - Health Networking Digital Ecosy stems and Technologies ( EDT ), Shenzhen, vol. 1, pp. 390-393, 2010. [21] A. Chhabra and S. Mathur, “Modified RSA Algorithm: A Secure Approach,”2011 International Conference on Computational Intelligence and Communication Networks, Gwalior, pp. 545-548, 2011. [22] B. Swami, et al.,“Dual Modulus RSA Based on Jordan-totient Function, Procedia Technology,vol. 24, pp. 1581- 1586, 2016. [23] R. Patidar and R. Bhartiya, “Modified RSA Cryptosystem Based on Offline Storage and Prime Number,”2013 IEEE International Conference on Computational Intelligence and Computing Research, Enathi, pp.1-6, 2013. [24] R. L. Rivest, et al., “A Method for Obtaining Digital Signatures and Public-key Cryptosystems,”Communications of the ACM , vol. 21, pp. 120-126, 1978. [25] K. Govinda, et al.,“Data Security in Cloud using Blowfish Algorithm,”International Journal for Scientific Research & Development,vol. 2, 2014.
  • 8. Int J Elec & Comp Eng ISSN: 2088-8708  An efficient and secure data storage in cloud computing using modified RSA public ... (Y. Kiran Kumar) 537 BIOGRAPHIES OF AUTHORS Mr. Y.Kiran Kumar, M.C.A, (Ph.D), he received his Master of Computer Applications from Sri Venkatesra University,Tirupati. He is Pursuing Ph.D from Bharathiar University, Coimbatore. He is having more than 10 years of teaching experience, Currently he is working as a Assistant Professor in the department of M.C.A in Sree Vidyanikethan Engineering College, Affiliated by JNTUA, Ananthapuramu, India. His areas of research interests include Web Technologies, Service Oriented Architecture and Cloud Computing. Dr. R. Mahammad Shafi, M.C.A, M.Tech, Ph.D He received his Ph.D from University of Allahabad, Allahabad. He is having more than 20 years of teaching experience. His areas of research interests include Software Engineering, Software Testing and Quality Assurance. He has published papers in refereed journals and conference proceedings in these areas. He has been involved in conferences and workshops as a Committee member, organizer and Session Chair.